I don't see why one would need a script to exploit the hole. In any event, I'd like to shim the API to catch this bug, since the fat and sassy millionaire monopolists at Microsoft are unlikely to get off their derrieres to fix the bug during Christmas. Unfortunately, it's part of a big system DLL with tons of entry points. How best to shim it?
--Brett At 07:19 PM 12/24/2004, flashsky wrote: > This vul can be exploited, at > http://www.xfocus.net/flashsky/icoExp/index.html ,i give a test exp(open > 28876 port) for windows xp sp1, but it need html sctipt run and allocate > memory. _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
